PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

被引:192
|
作者
Xiao, Liang [1 ,2 ]
Li, Yan [1 ]
Han, Guoan [1 ]
Liu, Guolong [1 ]
Zhuang, Weihua [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing 100093, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Game theory; PHY-layer authentication; reinforcement learning; spoofing detection; PHYSICAL-LAYER; AUTHENTICATION; GAME;
D O I
10.1109/TVT.2016.2524258
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the PHY-layer authentication that exploits radio channel information (such as received signal strength indicators) to detect spoofing attacks in wireless networks. The interactions between a legitimate receiver and spoofers are formulated as a zero-sum authentication game. The receiver chooses the test threshold in the hypothesis test to maximize its utility based on the Bayesian risk in the spoofing detection, whereas the spoofers determine their attack frequencies to minimize the utility of the receiver. The Nash equilibrium of the static authentication game is derived, and its uniqueness is discussed. We also investigate a repeated PHY-layer authentication game for a dynamic radio environment. As it is challenging for the radio nodes to obtain the exact channel parameters in advance, we propose spoofing detection schemes based on Q-learning and Dyna-Q, which achieve the optimal test threshold in the spoofing detection via reinforcement learning. We implement the PHY-layer spoofing detectors over universal software radio peripherals and evaluate their performance via experiments in indoor environments. Both simulation and experimental results have validated the efficiency of the proposed strategies.
引用
收藏
页码:10037 / 10047
页数:11
相关论文
共 50 条
  • [21] Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging
    Baker, Richard
    Martinovic, Ivan
    [J]. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 407 - 424
  • [22] AI-Based Abnormality Detection at the PHY-Layer of Cognitive Radio by Learning Generative Models
    Toma, Andrea
    Krayani, Ali
    Farrukh, Muhammad
    Qi, Haoran
    Marcenaro, Lucio
    Gao, Yue
    Regazzoni, Carlo S.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (01) : 21 - 34
  • [23] PHY-Layer Resiliency in OFDM Communications: A Tutorial
    Shahriar, Chowdhury
    La Pan, Matt
    Lichtman, Marc
    Clancy, T. Charles
    McGwier, Robert
    Tandon, Ravi
    Sodagari, Shabnam
    Reed, Jeffrey H.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (01): : 292 - 314
  • [24] Opinion: PHY-Layer Security is no Alternative to Cryptography
    Robyns, Pieter
    Quax, Peter
    Lamotte, Wim
    [J]. PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 160 - 162
  • [25] Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks
    El Shafie, Ahmed
    Niyato, Dusit
    Al-Dhahir, Naofal
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (04) : 400 - 403
  • [26] PHY-Layer Location Privacy-Preserving Access Point Selection Mechanism in Next-Generation Wireless Networks
    Farhang, Sadegh
    Hayel, Yezekael
    Zhu, Quanyan
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 263 - 271
  • [27] Information Security of PHY Layer in Wireless Networks
    Fang, Weidong
    Li, Fengrong
    Sun, Yanzan
    Shan, Lianhai
    Chen, Shanji
    Chen, Chao
    Li, Meiju
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [28] PHY-layer Security of MIMO-NOMA with SWIPT
    Zamanipour, Makan
    [J]. INTERNET TECHNOLOGY LETTERS, 2019, 2 (06)
  • [29] Optimizing Energy-Efficiency of PHY-Layer Authentication in Machine-to-Machine Networks
    Bartoli, A.
    Hernandez-Serrano, J.
    Soriano, M.
    Dohler, M.
    Kountouris, A.
    Barthel, D.
    [J]. 2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1663 - 1668
  • [30] A Framework of the PHY-layer Approach to Defense Against Security Threats in Cognitive Radio Networks
    Wen, Hong
    Li, Shaoqian
    Zhu, Xiping
    Zhou, Liang
    [J]. IEEE NETWORK, 2013, 27 (03): : 34 - 39